1: Configure Frame Relay in a Hub-and-Spoke TopologyStep 1. Configure the Frame Relay core.Use the addressing tables and the following requirements.
HQ is the hub router. B1, B2, and B3 are the spokes.
HQ uses a point-to-point subinterface for each of the Branch routers.
B3 must be manually configured to use IETF encapsulation.
The LMI type must be manually configured as q933a for HQ, B1, and B2. B3 uses ANSI.

Step 2. Configure the WAN link from HQ to NewB using PPP encapsulation and PAP authentication.You need to connect a cable to the correct interfaces. HQ is the DCE side of the link. You choose the clock rate. The PAP password is ciscopap.

Task 3: Configure Static and Dynamic NAT on HQ
Step 1. Configure NAT.Use the following requirements:
Allow all addresses for the 10.0.0.0/8 address space to be translated.
XYZ Corporation owns the 209.165.200.240/29 address space. The pool, XYZCORP, uses addresses .241 through .245 with a /29 mask.
The www.xyzcorp.com website at 10.0.1.2 is registered with the public DNS system at IP address 209.165.200.246.

Step 2. Verify NAT is operating by using extended ping.From HQ, ping the serial 0/0/0 interface on ISP using the HQ LAN interface as the source address. This ping should succeed.
Verify that NAT translated the ping with the show ip nat translations command.

Task 6: Configure and Optimize EIGRP RoutingStep 1. Configure HQ, B1, B2, and B3 with EIGRP.Use AS 100.
Disable EIGRP updates on appropriate interfaces.
Manually summarize EIGRP routes so that each Branch router only advertises the 10.X.0.0/16 address space to HQ.
Note: Packet Tracer does not accurately simulate the benefit of EIGRP summary routes. Routing tables will still show all subnets, even though you correctly configured the manual summary.

Step 2. Verify routing tables and connectivity.HQ and the Branch routers should now have complete routing tables.The NetAdmin PC should now be able to ping each VLAN subinterface on each Branch router.

Task 7: Configure VTP, Trunking, the VLAN Interface, and VLANsThe following requirements apply to all three Branches. Configure one set of three switches. Then use the scripts for those switches on the other two sets of switches.Step 1. Configure Branch switches with VTP.BX-S1 is the VTP server. BX-S2 and BX-S3 are VTP clients.The domain name is XYZCORP. <– mistake all is lower character xyzcorp
The password is xyzvtp.

Step 5. Verify that VLANs have been sent to BX-S2 and BX-S3.Use the appropriate commands to verify that S2 and S3 now have the VLANs you created on S1. It may take a few minutes for Packet Tracer to simulate the VTP advertisements. A quick way to force the sending of VTP advertisements is to change one of the client switches to transparent mode and then back to client mode.

Step 2. Configure port security.Use the following policy to establish port security on the BX-S2 access ports:Allow only one MAC address
Configure the first learned MAC address to "stick" to the configuration
Set the port to shut down if there is a security violation

Task 10: Configure DHCPStep 1. Configure DHCP pools for each VLAN.On the Branch routers, configure DHCP pools for each VLAN using the following requirements:
Exclude the first 10 IP addresses in each pool for the LANs.
Exclude the first 24 IP addresses in each pool for the wireless LANs.
The pool name is BX_VLAN## where X is the router number and ## is the VLAN number.
Include the DNS server attached to the HQ server farm as part of the DHCP configuration.

Step 2. Implement a basic firewall ACL.Because ISP represents connectivity to the Internet, configure a named ACL called FIREWALL in the following order:
Allow inbound HTTP requests to the www.xyzcorp.com server.
Allow only established TCP sessions from ISP and any source beyond ISP.
Allow only inbound ping replies from ISP and any source beyond ISP.
Explicitly block all other inbound access from ISP and any source beyond ISP.